Author of the publication

Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks.

, , , , and . IEEE Trans. Dependable Secur. Comput., 15 (6): 959-973 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A fuzzy similarity-based rough set approach for attribute selection in set-valued information systems., , , and . Soft Comput., 24 (6): 4675-4691 (2020)Index Page Based EDoS Attacks in Infrastructure Cloud., and . SNDS, volume 420 of Communications in Computer and Information Science, page 382-395. Springer, (2014)Negotiation for resource allocation in IaaS cloud., , and . Bangalore Compute Conf., page 15. ACM, (2011)Allocation of Slotted Deadline Sensitive Leases in Infrastructure Cloud., , , , and . ICDCIT, volume 7154 of Lecture Notes in Computer Science, page 242-252. Springer, (2012)VMCloner: A Fast and Flexible Virtual Machine Cloner., and . CGC, page 181-187. IEEE Computer Society, (2013)Secure VM backup and vulnerability removal in infrastructure clouds., and . ICACCI, page 1217-1226. IEEE, (2014)A Fuzzy Regression Technique Through Same-Points in Fuzzy Geometry., , and . ICMC, volume 834 of Communications in Computer and Information Science, page 216-224. Springer, (2018)Policy based resource allocation in IaaS cloud., , and . Future Gener. Comput. Syst., 28 (1): 94-103 (2012)DDoS attacks in cloud computing: Issues, taxonomy, and future directions., , , , and . Comput. Commun., (2017)DDoS attacks in cloud computing: Collateral damage to non-targets., , , and . Comput. Networks, (2016)